all about cyber crime

7
Today's information is highly interconnected by the Internet. With this interconnection comes computer crime. Breaking, stealing or damaging into computer systems is known as hacking, Recently, Hacking has become extremely common on the Internet. On average, there are 30,000 hacks on websites and servers every day. Nowadays you even can hire a hacker for less than minimum wage! The number of vulnerabilities on the internet is huge, which makes the internet and general public an easy target. Picture this, a secret company has created a special suit that allows people to go through walls and read your most personal information and secrets. They can now take now take this information and post it wherever they please. This is essentially what hacking is. There are many causes for hacking. Some people just want to use your computer, some want to steal services or valuable files.

Upload: anonymous-ryrs4im3

Post on 26-Jan-2016

1 views

Category:

Documents


0 download

DESCRIPTION

Cyber Crime facts

TRANSCRIPT

Page 1: All about Cyber Crime

Today's information is highly interconnected by the Internet. With this interconnection comes computer crime. Breaking, stealing or damaging into computer systems is known as hacking, Recently, Hacking has become extremely common on the Internet. On average, there are 30,000 hacks on websites and servers every day. Nowadays you even can hire a hacker for less than minimum wage! The number of vulnerabilities on the internet is huge, which makes the internet and general public an easy target.

Picture this, a secret company has created a special suit that allows people to go through walls and read your most personal information and secrets. They can now take now take this information and post it wherever they please. This is essentially what hacking is.

There are many causes for hacking. Some people just want to use your computer, some want to steal services or valuable files. Some people even hack for thrill and excitement.

A false cause it that hackers want your data. However, this is usually not the case. Most people are just curious to see what they can learn about your company or people within your company. These hackers typically don’t have any malicious motivation and are usually unaware that their actions violate security codes.

Page 2: All about Cyber Crime

According to the Center for Strategic and International Studies. as many as 500,000 U.S. jobs are lost each year from costs associated with cyber espionage.

Analysts say that the real threat to American workers is when a company steals information from a competitor, eventually driving that competitor out of business.

"If you steal a million dollars worth of intellectual property and make a competing product, that's where sales go down and that's where you get a loss of jobs,"

Hacking costs the overall U.S. economy as much as $100 billion each year. U.S. companies spend millions of dollars securing their networks, buying insurance and repairing their reputations after getting hacked.

One solution would be for the government to impose Internet laws, such as encouraging people to put more security walls to prevent access to their computer from the outside. This prevents unauthorized control, Trojans, spyware and other methods of security breaching. Governments should encourage people to Use complex passwords and ensure they change them on a regular basis.

 

Page 3: All about Cyber Crime

Information from across the world is stored on computer systems-most of which are connected, networked, to other computer systems through the Internet. In the ideal situation, this interconnection of information enables others from outside a specific computer network to access that specific computer network and its information. This has created a world in which information is extremely important and extremely easy to access, which in turn has created a government, business, and personal society that is dependant on and successful from the networked information. But this network also has its drawbacks. Besides enabling people who need to use the information for legitimate business or personal use to gain access, the network also-often unknowingly-enables unauthorized people to gain access to the information in one way or another, no matter what kind of network security they have implemented. Gaining access to a computer system that does not intentionally allow you access is called hacking.

 

Hacking causes many problems for networked information. Hackers can change and damage information. They can sell information. They can destroy information. They can destroy the computer systems the information is stored in. It is estimated that hackers have caused between $145 million and $5 billion in damage to hacked systems annually in the United States (Skinner 1). The destruction or damaging of information is why it is important to determine whether hacking should be considered a criminal activity.

 

But along with hacking comes the terms to prevent hacking. Some suggest creating strict Internet laws that could be used to make and prove hacking a crime. Some suggest that the government sniff-a type of eavesdropping of the Internet-Internet traffic and monitor such things as e-mail. But both of these actions to prevent hacking,

Page 4: All about Cyber Crime

to make it a crime, also infringe on the privacy rights of everyone who uses the Internet. This is another reason why it is important to determine whether hacking should be considered a criminal activity, because if it is, it could affect a lot more people than just the hackers.

 

There are two primary sides to the hacking controversy: the hackers and the non-hackers. The hackers believe that what they are doing does not constitute a crime. One argument is that they provide a service to organizations by breaking into them. Specifically, by hackers breaking into an organization's network, they are showing the organization what their security holes are so that they can fix them.

 

Hackers also believe that hacking shouldn't be a crime because it is not the hacker's fault if the organization does not have a strong security system for their network. Hackers believe that if they can get into the network, it is the organization's fault, not their's.

 

Hackers also believe that the Internet is free. They believe that the Internet does not belong to anyone. And for this reason, anything that is found on the Internet or on a network connected to the Internet is open to the public.

seuriy 

Determining Factors

Hackers argue that if they can break in to a network-they should be

Page 5: All about Cyber Crime

allowed to do it. Hackers take great pride in their computer skills and see breaking into a network as an accomplishment that few can do, so they should be awarded for it.

 

Non-hackers, whether they are government officials, businesses, or the general public, believe that hackers infringe on their privacy. They believe that hackers break in to their computers or computer networks and look at, change, destroy, and steal their private information.

 

Non-hackers believe that hackers are criminals. They are breaking into computer networks that contain private information. They liken it to a burglar breaking into a person's house. Even if that burglar does not steal or destroy anything in the house, it is still illegal for them to be there.

  One solution would be to have more more regulation on the internet to ward off hackers. However, with more regulation of the Internet comes less freedom of the Internet, and, probably the most important result that divides this group, less privacy. With more regulation comes more policing, and with more policing less freedom and privacy.

 

Other non-hackers believe that hackers need to be caught and punished, but without taking away the freedom and privacy that the Internet offers now. They do not want the government or law enforcement to monitor the Internet. They only want better laws to prosecute the hackers after they are caught, and better ways of catching the hackers without infringing on the general public's privacy.